50 research outputs found

    Анализ конструкции и разработка технологии сборки рамы 3D принтера

    Get PDF
    Цель работы – разработка конструкторской документации, и непосредственная сборка 3D-принтер. В результате исследования изучена и доработана конструкция 3Д-пинтера послойного наплавления, разработана конструкторская документация, проведены изготовление и сборка рабочей модели. Основные конструктивные, технологические и технико-эксплуатационные характеристики: • Габариты изготавливаемых моделей 200х200х220; • Тип используемого пластика PLA или ABS; • Скорость печати до 110 мм/с. Степень внедрения: проводятся пуско-наладочные работы. Область применения: быстрое прототипирование малогабаритных деталей; обучение студентов созданию 3Д-моделей для 3Д-печати и развитие навыков работы с аддитивным оборудованием. В будущем планируется экспериментально отработать рабочие режимы 3Д-принтера.Objective - Development of design documentation, calculation accuracy of the collected parts and direct assembly of 3D-printer. The study examined and refined design 3D-Pinter layered fusing, design documentation, manufacture and assembly held a working model. The basic constructive, technological and technical and operational characteristics: • Dimensions of produced models 200х200х220; • The type of plastic PLA or ABS; • Print speed up 110 mm/s. Degree of implementation: carried out commissioning. Scope: rapid prototyping small parts; teaching students the creation of 3D models for 3D printing and the development of skills with additive hardware. In the future it is planned to work out experimentally operating modes 3D-printer

    Nostradamus goes Quantum

    Get PDF
    In the Nostradamus attack, introduced by Kelsey and Kohno (Eurocrypt 2006), the adversary has to commit to a hash value y of an iterated hash function H such that, when later given a message prefix P, the adversary is able to find a suitable suffix explanation S with H(P||S)=y. Kelsey and Kohno show a herding attack with 22n/32^{2n/3} evaluations of the compression function of H (with n bits output and state), locating the attack between preimage attacks and collision search in terms of complexity. Here we investigate the security of Nostradamus attacks for quantum adversaries. We present a quantum herding algorithm for the Nostradamus problem making approximately n323n/7\sqrt[3]{n}\cdot 2^{3n/7} compression function evaluations, significantly improving over the classical bound. We also prove that quantum herding attacks cannot do better than 23n/72^{3n/7} evaluations for random compression functions, showing that our algorithm is (essentially) optimal. We also discuss a slightly less tight bound of roughly 23n/7s2^{3n/7-s} for general Nostradamus attacks against random compression functions, where s is the maximal block length of the adversarially chosen suffix S

    FUSE – Flexible File Format and Intermediate Representation for Secure Multi-Party Computation

    Get PDF
    Secure Multi-Party Computation (MPC) is continuously becoming more and more practical. Many optimizations have been introduced, making MPC protocols more suitable for solving real-world problems. However, the MPC protocols and optimizations are usually implemented as a standalone proof of concept or in an MPC framework and are tightly coupled with special-purpose circuit formats, such as Bristol Format. This makes it very hard and time-consuming to re-use algorithmic advances and implemented applications in a different context. Developing generic algorithmic optimizations is exceptionally hard because the available MPC tools and formats are not generic and do not provide the necessary infrastructure. In this paper, we present FUSE: A Framework for Unifying and Optimizing Secure Multi-Party Computation Implementations with Efficient Circuit Storage. FUSE provides a flexible intermediate representation (FUSE IR) that can be used across different platforms and in different programming languages, including C/C++, Java, Rust, and Python. We aim at making MPC tools more interoperable, removing the tight coupling between high-level compilers for MPC and specific MPC protocol engines, thus driving knowledge transfer. Our framework is inspired by the widely known LLVM compiler framework. FUSE is portable, extensible, and it provides implementation-agnostic optimizations. As frontends, we implement HyCC (CCS\u2718), the Bristol circuit format, and MOTION (TOPS\u2722), meaning that these can be automatically converted to FUSE IR. We implement several generic optimization passes, such as automatic subgraph replacement and vectorization, to showcase the utility and efficiency of our framework. Finally, we implement as backends MOTION and MP-SPDZ (CCS\u2720), so that FUSE IR can be run by these frameworks in an MPC protocol, as well as other useful backends for JSON output and the DOT language for graph visualization. With FUSE, it is possible to use any implemented frontend with any implemented backend and vice-versa. FUSE IR is not only efficient to work on and much more generic than any other format so far -- supporting, e.g., function calls, hybrid MPC protocols as well as user-defined building blocks, and annotations -- while maintaining backwards-compatibility, but also compact, with smaller storage size than even minimalistic formats such as Bristol already for a few hundred operations

    Case Report: A Case of Severe Clinical Deterioration in a Patient With Multiple Sclerosis

    Get PDF
    Tumefactive multiple sclerosis (MS) is a rare variant of MS that may lead to a rapidly progressive clinical deterioration requiring a multidisciplinary diagnostic workup. Our report describes the diagnostic and therapeutic approach of a rare and extremely severe course of MS. A 51-year-old man with an 8-year history of relapsing-remitting MS (RRMS) was admitted with a subacute progressive left lower limb weakness and deterioration of walking ability. After extensive investigations including repeated MRI, microbiological, serological, cerebrospinal fluid (CSF) studies, and finally brain biopsy, the diagnosis of a tumefactive MS lesion was confirmed. Despite repeated intravenous (IV) steroids as well as plasma exchanges and IV foscarnet and ganciclovir owing to low copy numbers of human herpesvirus 6 (HHV-6) DNA in polymerase chain reaction (PCR) analysis, the patient did not recover. The clinical presentation of tumefactive MS is rare and variable. Brain biopsy for histopathological workup should be considered in immunocompromised patients with rapidly progressive clinical deterioration with brain lesions of uncertain cause

    Inequalities in women's awareness of changes to the State Pension Age in England and the role of cognitive ability

    Get PDF
    As a response to the ageing population, the United Kingdom (UK) government, like many others, has increased the State Pension Age. This has involved equalising women's State Pension Age with men's, raising it from 60 to 65, with further increases already underway. It has been argued that a key issue with how this change has been implemented is the lack of notice the government gave to the women affected, impacting on their ability to plan for retirement. So far, there has been very little research exploring inequalities in awareness of these developments and, in particular, considering whether women of particular socio-economic backgrounds are less likely to know about the changes. This has implications for potentially further widening inequalities in old age. In this paper we analyse data from the English Longitudinal Study of Ageing. We consider the role of cognitive ability in mediating the relationship between socio-economic background and awareness, given recent debates on deficiencies in financial literacy. We find that socio-economic inequalities exist, especially with respect to labour force status, occupation and education. We also find that cognitive ability, especially numeracy, mediates a sizeable proportion of the relationship. These findings have important implications in terms of implementing future policy changes and awareness campaigns to help mitigate the possibility that they will further entrench inequalities in older age

    Патриотическое воспитание молодежи на примере малой Родины

    Get PDF
    В статье поднята важнейшая тема - патриотическое воспитание подрастающего поколения России. Этот вопрос особенно актуален сейчас, учитывая то, что в современном обществе произошла переоценка значимости жизненных ценностей: материальное благополучие стало основным, духовно-нравственное стало вторичным. Авторы анализируют сложившуюся ситуацию, приводят успешные примеры работы с молодежью на примере Юргинского района. В статье даны рекомендации по возрождению патриотического воспитания, как на местном уровне, так и на уровне государства

    Молодежь и современные информационные технологии: сборник трудов XVI Международной научно-практической конференции студентов, аспирантов и молодых учёных, 3-7 декабря 2018 г., г. Томск

    Get PDF
    Сборник содержит доклады, представленные на XVI Международной научно-практической конференции студентов, аспирантов и молодых ученых «Молодежь и современные информационные технологии», прошедшей в Томском политехническом университете на базе Инженерной школы информационных технологий и робототехники. Материалы сборника отражают доклады студентов, аспирантов и молодых ученых, принятые к обсуждению на секциях: «Компьютерное моделирование и интеллектуальный анализ данных», «Автоматизация и управление в технических системах», «Робототехнические и мехатронные системы», «Цифровизация, IT и цифровая экономика», «Компьютерная графика и дизайн». Сборник предназначен для специалистов в области информационных технологий, студентов и аспирантов соответствующих специальностей

    Research and Design of a Routing Protocol in Large-Scale Wireless Sensor Networks

    Get PDF
    无线传感器网络,作为全球未来十大技术之一,集成了传感器技术、嵌入式计算技术、分布式信息处理和自组织网技术,可实时感知、采集、处理、传输网络分布区域内的各种信息数据,在军事国防、生物医疗、环境监测、抢险救灾、防恐反恐、危险区域远程控制等领域具有十分广阔的应用前景。 本文研究分析了无线传感器网络的已有路由协议,并针对大规模的无线传感器网络设计了一种树状路由协议,它根据节点地址信息来形成路由,从而简化了复杂繁冗的路由表查找和维护,节省了不必要的开销,提高了路由效率,实现了快速有效的数据传输。 为支持此路由协议本文提出了一种自适应动态地址分配算——ADAR(AdaptiveDynamicAddre...As one of the ten high technologies in the future, wireless sensor network, which is the integration of micro-sensors, embedded computing, modern network and Ad Hoc technologies, can apperceive, collect, process and transmit various information data within the region. It can be used in military defense, biomedical, environmental monitoring, disaster relief, counter-terrorism, remote control of haz...学位:工学硕士院系专业:信息科学与技术学院通信工程系_通信与信息系统学号:2332007115216
    corecore